Oct 02, 2024Ravie LakshmananCyber Espionage / Cloud Security A previously undocumented threat actor called CeranaKeeper has been linked to a string of data exfiltration attacks targeting Southeast Asia. Slovak cybersecurity firm ESET, which observed campaigns targeting governmental institutions in Thailand starting in 2023, attributed the activity cluster as aligned to China, leveraging tools previously identified
Technology
Extensive damage from a fire at Tata Group’s Apple iPhone component plant in southern India could hamper production ahead of a festive season sales surge, an industry watcher and a source said, forcing the US firm’s suppliers to arrange critical parts from China or elsewhere. The weekend blaze has caused an indefinite production halt at
Oct 01, 2024The Hacker NewsGenerative AI / Data Protection Since its emergence, Generative AI has revolutionized enterprise productivity. GenAI tools enable faster and more effective software development, financial analysis, business planning, and customer engagement. However, this business agility comes with significant risks, particularly the potential for sensitive data leakage. As organizations attempt to balance productivity
Honor is developing a novel foldable technology that would enable the creation of a device that features a multi-directional foldable display. Details of this technology have surfaced in a patent document that shows how such a device would function. It is currently unclear whether Honor plans to launch a device with this technology in the
The threat actors behind the Rhadamanthys information stealer have added new advanced features to the malware, including using artificial intelligence (AI) for optical character recognition (OCR) as part of what’s called “Seed Phrase Image Recognition.” “This allows Rhadamanthys to extract cryptocurrency wallet seed phrases from images, making it a highly potent threat for anyone dealing
Amazon Great Indian Festival sale has entered its fifth day for all users in India. It brings discounts on products across a wide range of categories such as smartphones, wearables, laptops, and PCs, electronics, home appliances, and more. We have compiled a list of the best deals on PC components if you’re looking to build
Oct 01, 2024Ravie LakshmananCorporate Security / Financial Fraud The U.S. Department of Justice (DoJ) has charged a 39-year-old U.K. national for perpetrating a hack-to-trade fraud scheme that netted him nearly $3.75 million in illegal profits. Robert Westbrook of London was arrested last week and is expected to be extradited to the U.S. to face charges
Apple Vision Pro 2 is said to be on the cards and its development may commence as soon as next year, according to an industry analyst. The mixed reality headset is speculated to boast a next-generation Apple silicon chipset that could support Apple Intelligence — the suite of artificial intelligence (AI) features which might help
Sep 30, 2024Ravie LakshmananCybersecurity / Weekly Recap Hold onto your hats, folks, because the cybersecurity world is anything but quiet! Last week, we dodged a bullet when we discovered vulnerabilities in CUPS that could’ve opened the door to remote attacks. Google’s switch to Rust is paying off big time, slashing memory-related vulnerabilities in Android. But
Apple has been rumoured to be working on its smart home category for quite some time now. Now, a new report claims that the Cupertino-based tech giant might launch a new tabletop smart display device with smart home functionality next year. The device is said to be part of a series, where the higher-end variant
The threat actor known as Storm-0501 has targeted government, manufacturing, transportation, and law enforcement sectors in the U.S. to stage ransomware attacks. The multi-stage attack campaign is designed to compromise hybrid cloud environments and perform lateral movement from on-premises to cloud environment, ultimately resulting in data exfiltration, credential theft, tampering, persistent backdoor access, and ransomware
Amazon Great Indian Festival 2024 sale has entered its third day. It commenced on September 26 exclusively for Prime members and a day later for all users in India. The sale brings lucrative deals and other offers on a wide range of consumer-grade items across categories such as smartphones, tablets, wearables, electronics, home appliances, and
As security technology and threat awareness among organizations improves so do the adversaries who are adopting and relying on new techniques to maximize speed and impact while evading detection. Ransomware and malware continue to be the method of choice by big game hunting (BGH) cyber criminals, and the increased use of hands-on or “interactive intrusion”
Amazon Great Indian Festival 2024 sale brings discounts and other offers on a wide range of products across categories such as smartphones, wearables, laptops, tablets, electronics, home appliances, and more. We have recently curated a list of the top smartphone deals under Rs. 30,000 during the Amazon sale. However, if you already have a recently purchased
U.S. federal prosecutors on Friday unsealed criminal charges against three Iranian nationals who are allegedly employed with the Islamic Revolutionary Guard Corps (IRGC) for their targeting of current and former officials to steal sensitive data. The Department of Justice (DoJ) accused Masoud Jalili, 36, Seyyed Ali Aghamiri, 34, and Yasar (Yaser) Balaghi, 37, of participating
Amazon Great Indian Festival 2024 sale is live as the company’s biggest annual sale event in India. A wide range of products starting from furniture, fashion items, personal gadgets as well as large electronics can be purchased at a discounted rate during the sale. Customers can enjoy additional benefits like bank and exchange offers or
Sep 28, 2024Ravie LakshmananCryptocurrency / Mobile Security Cybersecurity researchers have discovered a malicious Android app on the Google Play Store that enabled the threat actors behind it to steal approximately $70,000 in cryptocurrency from victims over a period of nearly five months. The dodgy app, identified by Check Point, masqueraded as the legitimate WalletConnect open-source
A federal judge narrowed a lawsuit accusing Apple of violating the privacy of iPhone, iPad and Apple Watch users by collecting their personal data through proprietary apps such as the App Store, Apple Music and Apple TV. U.S. District Judge Edward Davila in San Jose, California, dismissed nearly all claims based on the “Allow Apps
Sep 27, 2024Ravie LakshmananLinux / Vulnerability A new set of security vulnerabilities has been disclosed in the OpenPrinting Common Unix Printing System (CUPS) on Linux systems that could permit remote command execution under certain conditions. “A remote unauthenticated attacker can silently replace existing printers’ (or install new ones) IPP urls with a malicious one, resulting
OnePlus Ace 5 Pro and Ace 5 are expected to launch as successors to the OnePlus Ace 3 Pro and Ace 3, respectively. Details about the handsets have surfaced online over the past few weeks. Previous leaks have suggested the base and Pro variants could come with Snapdragon 8 Gen 3 and Gen 4 chipsets, respectively. A new leak